Rogue Ap Detection - Cisco WAP125 Administrator's Manual

Wireless-ac/n dual band desktop access point with poe
Hide thumbs Also See for WAP125:
Table of Contents

Advertisement

Rogue AP Detection

On the networks that use IEEE 802.1X port-based network access control, a supplicant cannot gain access to
the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must configure
802.1X authentication information on the WAP device, so that it can supply it to the authenticator.
To configure the 802.1X supplicant settings follow these steps:
Step 1
Click Security > 802.1X Supplicant.
Step 2
In the 802.1x Supplicant area, check Enable to enable the administrative mode.
Step 3
Configure the 802.1X operational status and basic settings:
• EAP Method — Choose the algorithm to be used for encrypting authentication user names and passwords. The
options are:
◦MD5 — A hash function defined in RFC 3748 that provides basic security.
◦PEAP — Protected Extensible Authentication Protocol, which provides a higher level of security than MD5
by encapsulating it within a TLS tunnel.
◦TLS — Transport Layer Security, as defined in RFC 5216, an open standard that provides a high level of
security.
• Username — Enter the username.
• Password — Enter the password.
Step 4
In the Certificate File Upload area, you can upload a certificate file to the WAP device:
a) Choose either HTTP or TFTP as the transfer method.
b) If you selected HTTP, click Browse to select the file. See
more information on configuring the HTTP server settings.
c) If you selected TFTP, enter the filename and the TFTP Server IPv4 Address.
d) Click Upload. A confirmation window appears, followed by a progress bar to indicate the status of the upload.
Step 5
Click Save.
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without explicit authorization from
a system administrator. The rogue AP poses a security threat because anyone with access to the premises can
unconsciously or maliciously install an inexpensive wireless WAP device that can potentially allow unauthorized
parties to access the network.
The WAP device performs a RF scan on all channels to detect all APs in the vicinity of the network. If rogue
APs are detected, they are shown on the Rogue AP Detection page. If an AP listed as a rogue is legitimate, it
can be added to the Known AP List.
Cisco WAP125 Wireless-AC/N Dual Band Desktop Access Point with PoE
32
Connect Session Settings/HTTP/HTTPS Service Task
System Configuration
for

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents